Categories: SecurityWorkspace

SamSam Ransomware Attackers Rake In Nearly $6m

The enterprise-focused SamSam ransomware has netted nearly $6 million (£4.6m) since it was launched in late 2015, with profits continuing to rise at a rate of $300,000 a month, according to a new study by Sophos.

The computer security firm hasn’t been able to determine who is behind the malware, but found that all the attacks using it were carried out manually – a difference from other ransomware strains, which generally spread via email spam.

SamSam has gained public notoriety for its use in attacks on hospitals and city governments, such as an attack on Atlanta earlier this year.

But such organisations form only a small proportion of the incidents linked to SamSam, half of which have involved targets in the private sector.

Backups destroyed

Only one-quarter of attacks targeted healthcare, with another 13 percent against governments, Sophos said in a new report.

The criminals behind SamSam appear to target any vulnerable network belonging to a medium to large organisation, with three-quarters of the targets to date located in the US, and others in Canada, the UK and the Middle East.

After breaking in, the attackers wait until the middle of the night in the target’s time zone to launch the encryption process.

The attackers are unusually thorough, deliberately seeking out and destroying backups, and encrypting files in such a way that it’s often necessary to reinstall or reimage entire systems from scratch.

Sophos worked with a Bitcoin specialist to track wallets associated with SamSam and arrive at the malware’s total revenue figure. The investigation found that the SamSam hackers were continually increasing ransom amounts, with ransoms as high as $64,000 recorded.

Slow recovery

“Many victims found that they could not recover sufficiently or quickly enough to ensure business continuity on their own, and reluctantly paid the ransom,” Sophos said.

The company found that the attackers are continually improving SamSam, adding more security features into new versions of the tools and websites used in the attacks.

Even if a ransom is paid, recovery can be a slow process, since the attackers only supply decryption keys and tools, leaving users to decode the affected systems themselves.

The attacks can be prevented, however, Sophos said, with techniques such as blocking the port associated with the RDP protocol used in most SamSam incidents.

Organisations should make sure they’re also avoiding using default passwords and are employing multi-factor authentication, Sophos said, adding that offsite, offline backups can also help.

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Recent Posts

Hate Speech Watchdog CCDH To Quit Musk’s X

Target for Elon Musk's lawsuit, hate speech watchdog CCDH, announces its decision to quit X…

9 hours ago

Meta Fined €798m Over Alleged Facebook Marketplace Violations

Antitrust penalty. European Commission fines Meta a hefty €798m ($843m) for tying Facebook Marketplace to…

10 hours ago

Elon Musk Rebuked By Italian President Over Migration Tweets

Elon Musk continues to provoke the ire of various leaders around the world with his…

11 hours ago

VW, Rivian Launch Joint Venture, As Investment Rises To $5.8 Billion

Volkswagen and Rivian officially launch their joint venture, as German car giant ups investment to…

13 hours ago

AMD Axes 4 Percent Of Staff, Amid AI Chip Focus

Merry Christmas staff. AMD hands marching orders to 1,000 employees in the led up to…

15 hours ago

Tesla Recalls 2,431 Cybertrucks Over Propulsion Issue

Recall number six in 2024 for Tesla Cybertruck, and this time the fault cannot be…

16 hours ago